Oct 18, 2022Tech NewsDiscover a real-time recommendation engine based on graphsRecently we’ve discussed a lot about recommendation systems. Today we want to show you some of the efforts made to find solutions to...
Oct 4, 2022Tech NewsCyberspace actors who claim to break the law for the common goodWe’ve been talking a lot about cybersecurity here. Not sure we have ever given you a formal definition of a hacker. The concept of a...
Sep 27, 2022Tech NewsVizNN : Visual Data Augmentation with Convolutional Neural Networks for Cybersecurity InvestigationThis week, let’s dive in the use of an unusual method to reach a goal you know much about: automatic attack detection. The work presented...
Sep 19, 2022Tech NewsSnowballing in Systematic Literature Studies and a Replication in Software EngineeringThis week we would like to share with you an original research article. A big part of being a researcher - and the reason we are able to...
Jul 26, 2022Tech NewsVisual Decision-Support for Live Digital ForensicsThe number and frequency of malware is on the rise. This requires an increase in real-time investigations. However, conducting...
Jul 18, 2022Tech NewsA new way to evaluate the performance of new ML models quickly ? When developing new Machine Learning algorithms in cybersecurity, it often difficult to find data to train models. There are also risks...
Jul 18, 2022Tech NewsIs the future of cybersecurity in automation?Increasing attack surface, ransomware surge, cybersecurity talent shortage ... Implementing a sustainable cybersecurity strategy is...
Jul 10, 2022Tech NewsSMS-I : A new investigation tool from PortugalWe know that effectively investigating data from a system can help detect malicious attempts and better understand the context behind...
Feb 7, 2020Tech NewsWormGPt or how AI empowers cybercriminalsHere comes WormGPT, the notorious cybercrime tool designed to give malicious actors the upper hand.